4. Computer security has been a topic of great
importance since the emergence of second generation
main frame computers (early 1960's).
More than one dishonest programmer developed
software which would accumulate the inaccuracy of
each account transaction into a single account.
The losses were not noticed on individual accounts,
but were later noticed at the institutional level.
6. Internet emerged to the world in the early 21st
century(1990s). It started with a few group of
peoples and now it is a community of billions
people.
Like the faces of a coin, Internet has also got its
demerit. It is the most suitable platform for
Hijackers, attackers, to spread their threats.
The threats can be in the form of Virus, Malwares,
Trojans, etc.
8. Spyware refers to programs that surreptitiously monitor
activity on a computer system and report that information
to others without the user's consent.
9. Malware, short for malicious
software, is any software
used to disrupt computer
operation, gather sensitive
information, or gain access to
private computer systems.
10. Computer Viruses are programs
that can replicate their
structures or effects by infecting
other files or structures on a
computer. The common use of a
virus is to take over a computer
to steal data.
11. A Trojan horse, commonly known as a Trojan, is a general term
for malicious software that pretends to be harmless, so that a user
willingly allows it to be downloaded onto the computer.
12. Ransomware is a type of malware which restricts access
to the computer system that it infects, and demands a
ransom paid to the creator(s) of the malware in order for the
restriction to be removed.
13. KeyLogger, Keystroke logging, often referred to
as key logging or keyboard capturing, is the action of
recording (logging) the keys struck on a keyboard.
16. Avoid exposure to unauthenticated access,
unnecessary access to employees or users.
Install tools like anti malware, anti phishing
for scanning to detect vulnerabilities.
Install updated version of antivirus tool.
Guard the walls of the server with updated
firewalls.
17. Do not click blindly on the hyperlinks appearing in the
e-mail that came from the unknown sources.
Always look for the “https:” before trusting the
website especially, before providing credit card
information and personal information.
Be very much careful before downloading any content
from the suspicious or even from the unsecured
website.
Ignore clicking on the ad links as these behaviours
are marked by the spywares and further leads to
unknown threats.
18. Beware of downloading applications, files (mp3,
mp4, gif, etc) from the sites and also from the
attachments of the e-mails.
Use/buy certified and secured products from
the vendors.
Keep a habit of regularly scanning the system
also keep updating the virus scanning
tools/software.
20. 1. In Quarter 3, 2016 alone, 18 million new malware
samples were captured.
(Source: Panda Labs)
2. More than 4,000 ransomware attacks have occurred every
day since the beginning of 2016.
(Source: Computer Crime and Intellectual Property Section
(CCIPS))
3. The amount of phishing emails containing a form of
ransomware grew to
97.25% during Q3 2016, up from 92% in Q1 2016.
(Source: PhishMe 2016 Q3 Malware Review)
21. 4. 78% of people claim to be aware of the risks of unknown links in
emails. And yet they click anyway.
(Source: Friedrich-Alexander University (FAU))
5. 52% of organizations that
suffered successful cyber
attacks in 2016 aren't making
any changes to their security in
2017
(Source: Barkly, December 2016,
Security Confidence Headed Into
2017)